First published: Fri Sep 02 2022(Updated: )
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grafana Grafana-image-renderer | <3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31176 is a vulnerability in the Grafana Image Renderer backend plugin that allows unauthorized file disclosure.
CVE-2022-31176 has a severity rating of 8.1 (high).
CVE-2022-31176 affects Grafana Image Renderer version up to 3.6.1.
A malicious user can exploit CVE-2022-31176 to retrieve unauthorized files.
Yes, a fix for CVE-2022-31176 is available. It is recommended to update to a version beyond 3.6.1 of Grafana Image Renderer.